Skip to content

Commit

Permalink
Simplify language regarding names in Section 3.1.* (#242)
Browse files Browse the repository at this point in the history
The BRs have no requirements in Section 3.1.1, and all statements about
names in our certificates should be found in our profiles.
  • Loading branch information
aarongable authored Oct 22, 2024
1 parent 58a53bd commit 47737b7
Showing 1 changed file with 3 additions and 7 deletions.
10 changes: 3 additions & 7 deletions CP-CPS.md
Original file line number Diff line number Diff line change
Expand Up @@ -190,23 +190,19 @@ Read only access to the Policy and Legal Repository and certificate information

### 3.1.1 Types of names

Certificate distinguished names and subject alternative names are compliant with the Baseline Requirements.
See Section 7.1 for the types of names which may appear in Let's Encrypt certificates.

### 3.1.2 Need for names to be meaningful

No stipulation.

### 3.1.3 Anonymity or pseudonymity of subscribers

Subscribers are not identified in DV certificates, which have subject fields identifying only FQDNs (not people or organizations). Relying Parties should consider DV certificate Subscribers to be anonymous.
Subscribers are not identified in DV certificates. Certificates do not assert any specific relationship between Subscribers and registrants of domain names contained in certificates. Relying Parties should consider DV certificate Subscribers to be anonymous.

### 3.1.4 Rules for interpreting various name forms

Distinguished names in certificates are to be interpreted using X.500 standards and ASN.1 syntax.

Certificates do not assert any specific relationship between Subscribers and registrants of domain names contained in certificates.

Regarding Internationalized Domain Names, ISRG has no objection so long as the domain is resolvable via DNS. It is the CA's position that homoglyph spoofing should be dealt with by registrars, and Web browsers should have sensible policies for when to display the punycode versions of names.
It is the CA's position that homoglyph spoofing should be dealt with by registrars, and Web browsers should have sensible policies for when to display the punycode versions of names.

### 3.1.5 Uniqueness of names

Expand Down

0 comments on commit 47737b7

Please sign in to comment.